Last week, the President and Commander in Chief announced something many Americans had been anticipating (though less and less, as time passed) for nearly a decade. Osama bin Laden, the person responsible for the single largest murder of Americans in history had been found and summarily executed in a stunningly efficient covert operation carried out by the Navy Seals.
Not everyone reacted with the same celebratory response seen outside the White House and at Ground Zero. Bin Laden’s acolytes immediately threatened revenge, and some Pakistanis wondered just how a James Bond-like attack could have been carried out on their soil without their knowledge. (Perhaps they should be wondering how the most wanted man in the world could have been living the high life in their midst for almost five years.) For others, the news created an opportunity.
Within 24 hours of the President’s newscast announcing bin Laden’s death, email inboxes started receiving predictable bin Laden-related spam. The two most common subject lines I’ve seen are “Osama bin Laden captured!” and “Osama hanged!” Each purports to contain a photo attachment of the killing. These are intriguing offers, considering the U.S. government has yet to release a photo of the late bin Laden (and that he died by gunshot, not by noose).
Needless to say, the attachment is a complete fraud. This is not to say that it’s one of the many phony Photoshop images with which the web is rife these days. Rather, there is no photo at all—only a virus. I’ve personally seen at least two distinct iterations in this first spam wave (yes, there is a second wave): one email attachment that simply destroys your hard drive, and another that installs a nasty tracking worm.
While security researchers investigate who is wiping out hard drives, it’s probably safe to say that whoever is sending the tracking worms is after email contact lists, online bank or retail account information, birthdays, Social Security Numbers, physical addresses, or anything else that could fill in the blanks of your financials or your life for an identity thief.
The senders of these emails purport to be organizations sounding vaguely patriotic, and at least one claiming to the FBI. Predictably, the second wave followed the first almost immediately. This more sophisticated round of phishing attacks was marked by better grammar and spelling, and relied on emails that purported to have come from a person the potential victim would know—obviously someone whose address book had already been compromised. Some of these second-wave emails were even more clever; not only were they spelled correctly and came from someone the recipient knows—they actually “warned” of bin Laden-related phishing scams! In cases like these, the attachment is labeled something like “CNN: watch for fake bin Laden emails.”
Further, many of the second wave emails have links to Facebook and Twitter accounts, quite possibly to YOUR Facebook or Twitter account! Phishing attacks are commonly being geared toward Facebook, Twitter, and perhaps other social networking sites. In fact it appears identity thieves have learned to post their malware on the pages of innocent people.
Like a virus of the physiological kind, the scams and the malware they contain mutate very, very quickly. They become more sophisticated, more credible, and more targeted with each successive wave. These mutations are possible because identity thieves have so much information available to them that the really clever ones can correlate facts in order to make their attacks more likely to succeed.
Their success rate will inevitably become much higher as data thefts on a grand scale continue to happen every week. We are being surrounded, and they are closing in for the kill. The more data that is available to the thieves, the more likely it becomes that you will one day open the wrong attachment. If a thief has your email address and date of birth from one data breach, your email and the fact that you visit a veterans’ hospital from a different data breach, it may be safe to assume—and the thief certainly will—that you would be particularly interested in those bin Laden photos. Unfortunately, the assumption we need to make is that to the extent we use the web for commercial or social networking purposes, some identity thief somewhere has at least some information about us.
Bin Phishin’? (cont.) »
Image: Lenore Edman, via Flickr.com
Pages: 1 2
Pages: 1 2